Desain dan Analisis Sistem CyberShare Menggunakan Four Node Interplanetary File System (IPFS)

Tony Haryanto, Kalamullah Ramli

Abstract


Cybersecurity information sharing is a proactive and collaborative measure in enhancing organizational security by exchanging cybersecurity information using a centralized repository service. However, in practice, the use of centralized services poses a threat to distributed denial-of-service (DDoS) attacks which can result in system failure and cause single point of failure as well as man-in-the-middle (MITM) attacks which can result in modification of information and theft of exchanged information. This threat results in a lack of user confidence in the confidentiality, integrity, and availability of information. This study proposes the design of a secure cybersecurity information sharing (CyberShare) system using a private interplanetary file system (IPFS) network as a decentralized information storage. Unlike centralized storage which only has a single-node, CyberShare systems use four-node IPFS interconnected with swarm keys as authentication keys. This system allows users to store and share information from the sender to the recipient of information, avoiding dependence on a central server and reducing server load. The results of the analysis show that the proposed CyberShare system can guarantee the confidentiality, integrity, and availability of cyber security information. CyberShare systems can enhance the security of the information exchanged so that organizations can safely share and utilize cybersecurity information.

Keywords


cybersecurity, information sharing, ipfs

Full Text:

References


A. Lamssaggad, N. Benamar, A. S. Hafid, and M. Msahli, “A Survey on the Current Security Landscape of Intelligent Transportation Systems,” IEEE Access, vol. 9, no. Vlc, pp. 9180–9208, 2021, doi: 10.1109/ACCESS.2021.3050038.

D. P. Fidler, “Cybersecurity in the Time of COVID-19,” Counc. Foreign Relations, no. 2020, pp. 7–9, 2020, [Online]. Available: https://www.cfr.org/blog/cybersecurity-time-covid-19.

D. Y. Perwej, S. Qamar Abbas, J. Pratap Dixit, D. N. Akhtar, and A. Kumar Jaiswal, “A Systematic Literature Review on the Cyber Security,” Int. J. Sci. Res. Manag., vol. 9, no. 12, pp. 669–710, 2021, doi: 10.18535/ijsrm/v9i12.ec04.

A. B. Ajmal, M. A. Shah, C. Maple, M. N. Asghar, and S. U. Islam, “Offensive Security: Towards Proactive Threat Hunting via Adversary Emulation,” IEEE Access, vol. 9, pp. 126023–126033, 2021, doi: 10.1109/ACCESS.2021.3104260.

A. O. David and A. E. Akinrayo, “Summary of Cyber Threat Intelligence,” no. February 2023, doi: 10.2015/IJIRMF/202203006.

H. Dandan, Z. Yajuan, L. Junfeng, L. Chen, X. Mo, and S. Zhihai, “Research on centralized data-sharing model based on master data management,” MATEC Web Conf., vol. 139, 2017, doi: 10.1051/matecconf/201713900195.

A. Mallik, A. Ahsan, M. M. Z. Shahadat, and J. C. Tsou, “Man-in-the-middle-attack: Understanding in simple words,” Int. J. Data Netw. Sci., vol. 3, no. 2, pp. 77–92, 2019, doi: 10.5267/j.ijdns.2019.1.001.

A. Manoj Athreya et al., “Peer-to-Peer Distributed Storage Using InterPlanetary File System,” Adv. Intell. Syst. Comput., vol. 1133, no. January, pp. 711–721, 2021, doi: 10.1007/978-981-15-3514-7_54.

H. Gao, Z. Ma, S. Luo, Y. Xu, and Z. Wu, “BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control,” Wirel. Commun. Mob. Comput., vol. 2021, 2021, doi: 10.1155/2021/6658920.

R. Zeng, J. You, Y. Li, and R. Han, “An ICN-Based IPFS High-Availability Architecture,” 2022.

F. A. Putra, K. Ramli, N. Hayati, and T. S. Gunawan, “Pura-scis protocol: A novel solution for cloud-based information sharing protection for sectoral organizations,” Symmetry (Basel)., vol. 13, no. 12, pp. 1–22, 2021, doi: 10.3390/sym13122347.

M. Changjun and L. Yi, “Government information sharing scheme for cross-departmental collaboration,” Proc. - 2020 Int. Signal Process. Commun. Eng. Manag. Conf. ISPCEM 2020, pp. 169–172, 2020, doi: 10.1109/ISPCEM52197.2020.00040.

Y. Zhang, S. Deng, Y. Zhang, and J. Kong, “Research on government information sharing model using blockchain technology,” Proc. - 10th Int. Conf. Inf. Technol. Med. Educ. ITME 2019, pp. 726–729, 2019, doi: 10.1109/ITME.2019.00166.

T. Takahashi, “TOWARD GLOBAL CYBERSECURITY COLLABORATION : CYBERSECURITY OPERATION ACTIVITY MODEL National Institute of Information and Communications Technology , Tokyo , Japan , takeshi takahashi@ieee.org Nara Institute of Science and Technology , Nara , Japan , youki,” Innov. Futur. Networks Serv., pp. 1–8, 2011.

D. J. Van Veen, R. S. Kudesia, and H. R. Heinimann, “An Agent-Based Model of Collective Decision-Making: How Information Sharing Strategies Scale with Information Overload,” IEEE Trans. Comput. Soc. Syst., vol. 7, no. 3, pp. 751–767, 2020, doi: 10.1109/TCSS.2020.2986161.

K. Lee, “Comments on ‘Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption,’” IEEE Trans. Cloud Comput., vol. 8, no. 4, pp. 1299–1300, 2020, doi: 10.1109/TCC.2020.2973623.

S. Ghernaouti, L. Cellier, and B. Wanner, “Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building,” 2019 3rd Cyber Secur. Netw. Conf. CSNet 2019, pp. 58–62, 2019, doi: 10.1109/CSNet47905.2019.9108944.

S. Pal, M. Hitchens, T. Rabehaja, and S. Mukhopadhyay, “Security requirements for the internet of things: A systematic approach,” Sensors (Switzerland), vol. 20, no. 20, pp. 1–34, 2020, doi: 10.3390/s20205897.

L. K. V. S. M. A. P. P. Rajalakshmi A, “A Blockchain and IPFS basedframework for secure Research record keeping,” Int. J. Pure Appl. Math., vol. 119, no. 15, pp. 1437–1442, 2018.

M. Patel and N. Patel, “Exploring Research Methodology,” Int. J. Res. Rev., vol. 6, no. 3, pp. 48–55, 2019.




DOI: https://doi.org/10.30591/jpit.v8i2.5141

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

JPIT INDEXED BY

  
  

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.